Tuesday, 31 May 2016

Task 8

https://za.pinterest.com/timekajansenjoy/pins/

Task 7


Question 7

The top 5 cyber security risks in South Africa:

  • Hacktivism
  • Cyber theft
  • Financial cyber crime
  • Mobile matters
  • Zero-second matters

With many users on the net we don’t always pay attention to detail and often get exploited by these convincing hackers. It is so easy to be misled by a hacker an in doing this one could loses all his/her hard earned money or even identity. By not checking the page and just filling out ones’ information, we are giving access to those hacking in to our accounts. Or if users do not put passwords on their personal details or don’t update their passwords, this makes it easy for hackers to get into their information.

To avoid hackers from obtaining these personal information, users should check the URL and if there is a lock on it and that it starts with http. Users need to constantly update their passwords, update their anti-virus as well as double check the mail recipient to make sure that its not spam.

task 6

https://www.thinglink.com/scene/794146983240531968

Task 5


thinklink: https://www.thinglink.com/user/794126466215313408/scenes



task 4


Digital code of conduct:
Accessing the internet is at ones’ own risk. This code of conduct are guidelines for ones’ own safety. The user will adhere to these guidelines as they are crucial to the reputation that we uphold, and anyone who disobeys and abuses the use of the computer facilities will be held accountable and severely prosecuted.
10 points of netiquette
  • Make yourself look good online
  • Respect other people’s time and bandwidth
  • Share expert knowledge 
  • Help keep flame wars under control
  • Respect other peoples’ privacy
  • Don’t abuse your power
  • Be forgiving for other peoples’ mistakes
  • Remember the human
  • Know where you are in cyberspace
  • Adhere to the same standards of behaviour online that you follow in real life
The Penalties of not adhering to these guidelines:
  • 1st attempt is a warning for the hacker to adhere to the customs and regularity of the rules.
  • 2nd attempt is a fine which could vary in price and can be a hefty price to pay for the hacker trying to abuse information and send it to the general public.
  • 3rd attempt is prosecution if the mentioned above is not met and respected and this consequence can take a matter of years.
From a business perspective, I would add it in my code of conduct and furthermore incorporate it into my vison statement resulting in a good technological standard. A system will be connected to the student computers and will alert the officials if any rules were broken or if the code of conduct was violated the student on that computer will be held accountable.

references:
DIGC5110 manual guide book
 
 
 

task 3


Task 3:

Social economy: Unlocking value through social technologies:

Task 2


Q.2.1 Homo Naledi is an extinct species discovered by “cavers Rick Hunter and Steven Tucker in 2013 and Homo Naledi was formally described in September 2015 by a team of 47 led by American and South African paleoanthropologist Lee Berger from the University of Witwatersrand” (Wikimedia Foundation, Inc., 2015).

“On September 13, 2013 while in the Rising Star cave system, whilst looking for an extension, cavers Rick Hunter and Steven Tucker of the Speleological Exploration Club of South Africa found a narrow chimney or chute which measured 12m” (Wikimedia, Foundation, Inc.,2015). This chute led to a room approximately 30m underground, in which the surface was shattered with fossil bones. Upon entering the cave, the cavers Rick Hunter and Steven Tucker knew a fellow scientist from Johannesburg who was also searching for fossils.

The National Geographic society and the University of Witwatersrand collaborated and funded an expedition called the Rising Star expedition that lasted for 21 days in the month of November. In March 2014 a second expedition was launched by the same team that lasted around 4 weeks in the Dinaledi chamber. 

The Homo Naledi and the Homo sapiens species are very similar in resemblance, however the Homo Naledi is an older species, they are smaller in size, the male reaching approximately 5 feet in length and the female smaller. Other Features of the Homo Naledi is that they have curved fingers and a small skull.
Referencing:

Task 1.3